Question 1-
Prior to posting your initial post, go to the Ashford University Library to conduct your initial research. Identify a credible source (this is a step down from a “Scholarly Source” and includes editorials from reputable news sources and TV documentaries). Use the Scholarly, Peer Reviewed, and Other Credible Sources (Links to an external site.) document for guidance. Identify issues that are applicable to border security. Please ensure your sources are less than 5 years old.
Initial Post: Your initial post must be a minimum of 300 words in length. Summarize a minimum of two Homeland Security border security issues found in your initial research and advocate for the position of the author of the article or documentary. Support your claims with in-text citations and provide APA references at the end of your post. Use APA style (Links to an external site.), as outlined in the Ashford Writing Center” href=”http://writingcenter.ashford.edu/” target=”_blank” class=”external” rel=”noreferrer noopener”>Ashford Writing Center (Links to an external site.).
Question 2-
As time passes since the attacks of September 11, 2001, homeland security has improved, but concerns over privacy and civil liberties have increased. Advocates for security claim that new technologies and techniques in homeland security are necessary to protect the public. Privacy advocates believe that the mining of personal information and increased surveillance have negatively altered the American way of life.
The Constitution of the United States of America is the foundation of American law. The first 10 amendments to the Constitution, known as the Bill of Rights, along with the Fourteenth Amendment form the basis of criminal procedure. These amendments establish limitations upon the actions of government in policing, investigating, and prosecuting crime and in punishing offenders. One of the most important issues for law enforcement balancing these limitations investigating crime.
Review the First, Fourth, Fifth, Sixth, and Fourteenth Amendments to the Constitution and determine if Congress has the power to override the Constitution and pass laws to allow the National Security Agency and other government agencies to review phone calls, mine data and personal information, and otherwise invade the privacy of people within the United States, without probable cause.
Your initial post should be at least 300 words in length. Support your claims with examples from required material(s) and/or other scholarly resources, and properly cite any references. Use the Scholarly, Peer Reviewed, and Other Credible Sources (Links to an external site.) document for guidance.
Question 3-
Prior to posting your initial post go to the Ashford University Library to conduct your initial research. Identify a credible source (this is a step down from a scholarly source, and includes editorials from reputable news sources and TV documentaries), using the Scholarly, Peer Reviewed, and Other Credible Sources (Links to an external site.) document for guidance. Identify issues that are applicable to the Department of Homeland Security’s challenges with immigration control.
Your initial post must be a minimum of 300 words in length. Summarize two of the Homeland Security issues found in the article, journal article, or TV documentary and advocate for or against the position of the author of the article or documentary. Support your claims with in-text citations and provide an APA style (Links to an external site.) reference at the end of your post.
Question 4-
It seems that every day we hear of another cyber-attack on the United States. Some of these attacks are targeting databases of corporations, others are against the government or our critical infrastructure, some are in retaliation and are designed to be destructive, and others are designed to hold information or computers hostage until people or corporations pay ransom to get control of their computers and get their information back. Some of these attacks are by States and others by criminal elements. All of these come under the purview of the Department of Homeland Security.
Prior to posting your initial post go to the Ashford University Library to conduct your initial research. Identify a credible source (this is a step down from a “scholarly source” and includes editorials from reputable news sources and TV documentaries). Use the Scholarly, Peer Reviewed, and Other Credible Sources (Links to an external site.) document for guidance. Identify issues that are applicable to cyber security. Please ensure your references are less than 5 years old. Then go to the Department of Homeland Security website to review the Safeguard and Secure Cyberspace mission.
Initial Post. 1st Post Due by Day 3. As you analyze the types of cyber-attacks, current science and technology, and the mission of the Department of Homeland Security do you believe the Department of Homeland Security is up to the task of defending and securing the nation’s cyberspace? Does the Department of Homeland Security have the tools, tactics, and techniques available to defend and secure the cyberspace? Your initial post must be a minimum of 300 words in length. Support your claims with in-text citations and provide an APA reference list at the end of your post for all your references. Use APA style (Links to an external site.) as outlined in the Ashford Writing Center (Links to an external site.).
Question 5-
The Department of Homeland Security and state offices of homeland security were created in large scale after the terrorist attacks of September 11, 2001. Homeland security and emergency response has continued to evolve. New threats from Mexican drug cartels, cyber-attacks, lone-wolf terrorist attacks and new threats to aviation security have expanded the role and scope of homeland security organizations and personnel.
Prior to beginning on this forum review the latest DHS 2014 Quadrennial Homeland Security Review. Based on your collective study in Homeland Security and Emergency Management, identify two or three changes or trends you believe will occur in the Homeland Security and Emergency Response discipline in the next ten years. Identify those threats and sub-disciplines that will become more important between now and the next 10 years. What will be the new homeland security and emergency management challenges the United States will face in the next 10 years?
Your initial post should be at least 300 words in length. Support your claims with examples from required material(s) and/or other scholarly resources, and properly cite any references. Use the Scholarly, Peer Reviewed, and Other Credible Sources (Links to an external site.) document for guidance. Use APA style (Links to an external site.) as outlined in the Ashford Writing Center



0 comments